Fundamental Points of the ABScard Technology

Size: px
Start display at page:

Download "Fundamental Points of the ABScard Technology"

Transcription

1 Fundamental Points of the ABScard Technology Architettura ABSCARD Pagina 1 di 13

2 General Index 1.Architecture Introduction Security Management ABScard enterprise version Verticalizations System Architecture Presentation Identification Application Database ABScard Function Diagram Installation Prerequisites Hardware Prerequisites Prerequisiti Software...13 Architettura ABSCARD Pagina 2 di 13

3 1.Architecture 1.1 Introduction ABScard is a transactional system developed with multi-tier technology, in order to guarantee a high degree of separation between the data and the presentation of the data. The use of Java language and TCP/IP protocol allows the system to be implemented through various types of servers (Windows, Linux, UNIX, etc.) The possibility to host the database on servers with high levels of security and performance (ex. Mainframe IBM, UNIX servers, Windows servers) along with its modular architecture make the ABScard able to carry out an elevated number of transactions per second. The ABScard system is multichannel, and the system is able to elaborate transactions coming from: Internet : interfaced through a browser. POS terminals and/or smart-card reader terminals: on hardware using ABScard software Hand-held devices/smartphone Self-Service terminals Mobile Phones: transactions formatted through GSM messages Thanks to the capacity to run transactions through POS terminals and mobile phones, ABScard extends the benefits of an innovative transactional system to traditional circuits. ABScard is the ideal solution for: Payment systems Customer loyalty and point accumulation systems Authentication systems Electronic ticket offices Municipal ID cards for citizens Online betting Mobile phone recharge or debit card recharge Architettura ABSCARD Pagina 3 di 13

4 1.1.1 Security The security of the transactions is one of the principle characteristics of the system, on the internet channel ABScard makes use of the most recent technology available today. The transaction data are encrypted with symmetric public key algorithms and authentification. The encrypting algorithm used in this version of the software is rijndael, which has been certified by NIST (National Institute of Standard and Technology, USA) as well as the new AES (Advanced Encription Standard). In addition, the session keys have a duration limited to the transaction, making any brute force attack, besides practically impossible, also inconsequential (the session key changes constantly). Further security is provided by strong-authentication which confirms the reciprocal authentication between the server application and the client. This provides protection against attacks using pirate-applet mecchanisms. On the POS channel, the ABScard protocal allows for various levels of security, from clear transmission to transaction encryption using banking standards. Architettura ABSCARD Pagina 4 di 13

5 1.1.2 Management The system management is done through software modules with internet browser type interfacing. This allows the installation of work units to be as simplified as possible. Security is guaranteed by a system of personized access, which selectively authorizes the access to management functions. In addition, every operation is performed by the server with a transaction, which guarantees the security and registration of all activity. The management transactions all the following type of operations to be performed: Back-Office o Management of system tables o Batch elaborations o Pre-established queries o Dynamic queries o Management of internal security profiles o Management of Retailers Help-desk o Card Management o Merchant Management o Client terminal management (ex. POS) o Operator profile management Through the configuration files it is possible to personalize the menus and queries, in order to rapidly and independently personalize/verticalize the system. Architettura ABSCARD Pagina 5 di 13

6 1.1.3 ABScard enterprise version Verticalizations The enterprise version of the ABScard server allows the system to be integrated and/or personalized. The following are possible: Advanced integration with external informative structures (ex. Gateway/Service Providers) Perform user application. New transactions (Java language) able to expand the current functions of the system or to create new applications. The user transactions allow enterprise applications to be created rapidly, taking advantage of the architeture of a system that is transactional, scalable and multi-platform. Enterprise functions are available even on ABScard certified client platforms (ex. POS), which allow a great flexibility in the implementation of new transacions or the personalization of existing ones. Architettura ABSCARD Pagina 6 di 13

7 1.2 System Architecture The system is structured in four levels or tiers, each single level performs a specific system function. The levels are defined as follows: Presentation Identification Application Database The separation into multiple levels allows the system to be installed making the best use of the hardware architecture, which has been conceptualized according to the highest possible security levels. The transactions are developed using the concept of channels, which allows for a versatile system respect to the transmissive channel, that is interfaced only on the Presentation level. The relationship between levels is represented by the following diagram: Presentation I dentification Application Database Figure 1. Architettura ABSCARD Pagina 7 di 13

8 1.2.1 Presentation The presentation level is performed by one or more servers specialized in the channel function (gateway server) from which the transactions are received. The task of the presentation level is to carry out all of the specific functions of a determined channel and to streamline communication with the successive levels. On the internet channel, the function is performed through a web-server, which must support the execution of active pages (typically JSP) and be able to recall Java classes. The execution of the transactions does not require any application to be installed; the interfacing is done through an internet browser. The applied logic of the presentation is done through Java applet. On the POS channel, the presentation function is performed by a POS gateway server, which interfaces with the periferical communication devices towards the POS terminals. The execution of the transactions takes place through POS terminal, or hardware devices with smart-card readers, that have the client-pos ABScard software installed. The terminals connect to the server through one of the typical means of communication, such as a dedicated telephone line, a LAN/GPRS connection or serial connection. The concentration is done either by concentration device hardware or by service providers (ex. TNS). The server acts as the gateway towards the identification level. On the Mobile channel, the presentation function is performed by a GSM gateway server, that is able to communicate with devices or channels of transmission/reception of SMS messages towards the SMS service provider. The execution of the transaction takes place through telephones, typically mobile telephones, able to send SMS messages. The use of TCP protocol and encryption allows the presentation level to be geographically distributed in respect to the server applications. Architettura ABSCARD Pagina 8 di 13

9 1.2.2 Identification The identification level is implemented by one or more specialized server applications (called Identification Servers). Cyphering/deciphering the transactions Transaction identification Proxing of the transactions applied on one or more application server The function of proxing allows the transaction load to be distributed to multiple applied servers. Therefore, it is possible to specialize the servers for transaction groups. For volumes of elevated transactions, this function can be integrated with hardware devices for traffic balancing, that allows for the creation of redundant architecture at a high level of service Application The application level is implemented by one or more server applications. The server communicates with the identification level and normally accesses data by communicating with the database level by way of multiple connections (connection pool). An application server (APS) carries out the following functions: Syntactical check of the transactions Elaboration of the transactions Composition of the reply Registration (logging) Database The database level is implemented using a relational type database. The DBMS, to be compatible with the ABScard server, must be able to support SQL transactions and multiple connections via DJBC connections. Architettura ABSCARD Pagina 9 di 13

10 1.3 ABScard Function Diagram The following diagram shows the flow of a generic transaction coming from different clients. Protocol Converter HW or Protocol Converter Provider PTSN/GPRS POS Gateway ABScard Telephone Recharge (Jastfin) TCP/IP WebServer Gateway Application/ Identification Server ABScard Bet Providers Bank (acquirer Visa) Gateway GSM ABScard Database TCP/IP GSM PROVI DER Client Tier Service Delivery Center ABS Service Provider Tier Figure 2. Architettura ABSCARD Pagina 10 di 13

11 The elevated versatility allows the activation of a congruous number of servers for elevated transactional loads, or to concentrate the identification and application functions on a sole server. The separation of the protocol from the transactions (based on XML) and the presentation level allows for the modification of existing interfaces or the implementation of new communication channels, leaving the application server architecture unchanged. Architettura ABSCARD Pagina 11 di 13

12 1.4 Installation Prerequisites Hardware Prerequisites The ABScard system was developed to be independent from the hardware platform. It can be installed on a variable number of servers depending on the transactional volume that the system must support. The communication through TCP/IP Protocol, limited to the ports used, must be allowed between the servers that host the system and that are separate from systems of a hardware or software type. The number and the strength of the servers on which the system is installed is based on the transactional volume that must be guaranteed, from the access channel and also from the type of the transactions themselves. The web server, given the limited space on the disk and the elaborative load required by the system, does not require any particular strength. It is, however, necessary to adequately size the internet access keeping in mind the average dimensions of the pages (especially those containging applet) and the number of simultaneous connections that must be guaranteed. The Identification Server, having the highest elaborative load due to encryption, must be characterized by an adequate power in CPU. A multiprocessor server is often necessary, also to guarantee adequate transaction response times. The Application Server does not have specific characteristics, being above all the most easily expandible level (thanks to the transaction balancing function of the identification server). It can be flanked by other servers if necessary. The database server obviously requires characteristics regarding reliability in terms of data storage. Architettura ABSCARD Pagina 12 di 13

13 1.4.2 Prerequisiti Software Component Software Platform Notes Identification Server Multiplatform Requires Java Runtime 1.4 or higher. Application Server Multiplatform Requires Java Runtime 1.4 or higher. POS Server Multiplatform Requires Java Runtime 1.4 or higher. Database Multiplatform Certified with Microsoft SQL Server, MySQL, Oracle. Requires database with JDBC interface. Gateway Internet Multiplatform Requires WEB Server compatibile con JSP o ASP Gateway GSM Multiplatform Requires Java Runtime and specific interface with SMS carrier Helpdesk/backoffice via WEB Helpdesk/backoffice Client Multiplatform Multiplatform Requires WEB Server JSP or ASP compatible Requires Java Runtime 1.4 or higher. Architettura ABSCARD Pagina 13 di 13

All Business Solutions s.r.l. P.IVA 03645370283 www.abscard.com. Sede Legale Via Ripamonti, n.89 20141 Milano Tel. +39 2.36504272 Fax. +39 2.

All Business Solutions s.r.l. P.IVA 03645370283 www.abscard.com. Sede Legale Via Ripamonti, n.89 20141 Milano Tel. +39 2.36504272 Fax. +39 2. The ABScard system is the most innovative solution of its kind on the market for its services of customer loyalty and payment methods to supplement traditional banking services. All Business Solutions

More information

Client/server is a network architecture that divides functions into client and server

Client/server is a network architecture that divides functions into client and server Page 1 A. Title Client/Server Technology B. Introduction Client/server is a network architecture that divides functions into client and server subsystems, with standard communication methods to facilitate

More information

Secure web transactions system

Secure web transactions system Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends

More information

Information and Communications Technology Courses at a Glance

Information and Communications Technology Courses at a Glance Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer

More information

ITG Software Engineering

ITG Software Engineering IBM WebSphere Administration 8.5 Course ID: Page 1 Last Updated 12/15/2014 WebSphere Administration 8.5 Course Overview: This 5 Day course will cover the administration and configuration of WebSphere 8.5.

More information

Premium Server Client Software

Premium Server Client Software Premium Server Client Software Server / Client SMSPro & GSMS TH series Get the tools on hand Premium Server is designed to cover most of the applications in the market. It gives a hassle free management

More information

SMPP Gateway. Whitepaper. Whitepaper AGOSTO 2009. www.iquall.net/mensajeria_smppgateway.html

SMPP Gateway. Whitepaper. Whitepaper AGOSTO 2009. www.iquall.net/mensajeria_smppgateway.html Whitepaper Whitepaper AGOSTO 2009 www.iquall.net/mensajeria_smppgateway.html SMPP Introduce yourself in the SMS World without being an expert in the field of telecommunication. Use your actual platforms

More information

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

Exhibit B5b South Dakota. Vendor Questions COTS Software Set Appendix C Vendor Questions Anything t Applicable should be marked NA. Vendor Questions COTS Software Set Infrastructure 1. Typically the State of South Dakota prefers to host all systems. In the event

More information

DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service

DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service Achieving Scalability and High Availability Abstract DB2 Connect Enterprise Edition for Windows NT provides fast and robust connectivity

More information

LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS

LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS Venkat Perumal IT Convergence Introduction Any application server based on a certain CPU, memory and other configurations

More information

Purpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption...

Purpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption... Contents Purpose... 3 Background on Keyscan Software... 3 Client... 4 Communication Service... 4 SQL Server 2012 Express... 4 Aurora Optional Software Modules... 5 Computer Hardware Configurations... 6

More information

S y s t e m A r c h i t e c t u r e

S y s t e m A r c h i t e c t u r e S y s t e m A r c h i t e c t u r e V e r s i o n 5. 0 Page 1 Enterprise etime automates and streamlines the management, collection, and distribution of employee hours, and eliminates the use of manual

More information

MEGA Web Application Architecture Overview MEGA 2009 SP4

MEGA Web Application Architecture Overview MEGA 2009 SP4 Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.

More information

A framework for web-based product data management using J2EE

A framework for web-based product data management using J2EE Int J Adv Manuf Technol (2004) 24: 847 852 DOI 10.1007/s00170-003-1697-8 ORIGINAL ARTICLE M.Y. Huang Y.J. Lin Hu Xu A framework for web-based product data management using J2EE Received: 8 October 2002

More information

Oracle Net Services for Oracle10g. An Oracle White Paper May 2005

Oracle Net Services for Oracle10g. An Oracle White Paper May 2005 Oracle Net Services for Oracle10g An Oracle White Paper May 2005 Oracle Net Services INTRODUCTION Oracle Database 10g is the first database designed for enterprise grid computing, the most flexible and

More information

APIS IT d.o.o. Fiscalization technical aspects

APIS IT d.o.o. Fiscalization technical aspects APIS IT d.o.o. Fiscalization technical aspects Project overview April 2012. Project inception 14.6.2012. Conceptual design 26.7.2012. Proposal of Fiscalization Law 2.8.2012. Solution presentation 1.10.2012.

More information

DBMS Infrastructures and IT Career Recommendations. Jeff Fineberg November 21, 2011

DBMS Infrastructures and IT Career Recommendations. Jeff Fineberg November 21, 2011 DBMS Infrastructures and IT Career Recommendations Jeff Fineberg November 21, 2011 Topics Importance of Databases Security Computing Environments / Infrastructures Methodologies for Data access Database

More information

An Oracle White Paper July 2011. Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide

An Oracle White Paper July 2011. Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide An Oracle White Paper July 2011 1 Disclaimer The following is intended to outline our general product direction.

More information

Architecture Guidelines Application Security

Architecture Guidelines Application Security Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation

More information

Stock Trader System. Architecture Description

Stock Trader System. Architecture Description Stock Trader System Architecture Description Michael Stevens mike@mestevens.com http://www.mestevens.com Table of Contents 1. Purpose of Document 2 2. System Synopsis 2 3. Current Situation and Environment

More information

Version 14.0. Overview. Business value

Version 14.0. Overview. Business value PRODUCT SHEET CA Datacom Server CA Datacom Server Version 14.0 CA Datacom Server provides web applications and other distributed applications with open access to CA Datacom /DB Version 14.0 data by providing

More information

Flexible, Innovative POS and Store Inventory Management Solution

Flexible, Innovative POS and Store Inventory Management Solution SOLUTION BLUEPRINT RETAIL Flexible, Innovative POS and Store Inventory Management Solution Industry Retail Business Challenge Improving retail services while reducing operations expenses Technology Solution

More information

Alliance Key Manager Solution Brief

Alliance Key Manager Solution Brief Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major

More information

Attachment D System Hardware & Software Overview & Recommendations For IRP System

Attachment D System Hardware & Software Overview & Recommendations For IRP System Attachment D System Hardware & Software Overview & Recommendations For IRP System Submitted by Explore Information Services, LLC Table of Contents Table of Contents...2 Explore IRP Configuration Recommendations...3

More information

ORACLE DATABASE 10G ENTERPRISE EDITION

ORACLE DATABASE 10G ENTERPRISE EDITION ORACLE DATABASE 10G ENTERPRISE EDITION OVERVIEW Oracle Database 10g Enterprise Edition is ideal for enterprises that ENTERPRISE EDITION For enterprises of any size For databases up to 8 Exabytes in size.

More information

Title Page. Hosted Payment Page Guide ACI Commerce Gateway

Title Page. Hosted Payment Page Guide ACI Commerce Gateway Title Page Hosted Payment Page Guide ACI Commerce Gateway Copyright Information 2008 by All rights reserved. All information contained in this documentation, as well as the software described in it, is

More information

3-Tier Architecture. 3-Tier Architecture. Prepared By. Channu Kambalyal. Page 1 of 19

3-Tier Architecture. 3-Tier Architecture. Prepared By. Channu Kambalyal. Page 1 of 19 3-Tier Architecture Prepared By Channu Kambalyal Page 1 of 19 Table of Contents 1.0 Traditional Host Systems... 3 2.0 Distributed Systems... 4 3.0 Client/Server Model... 5 4.0 Distributed Client/Server

More information

.CRF. Electronic Data Capture and Workflow System for Clinical Trials

.CRF. Electronic Data Capture and Workflow System for Clinical Trials .CRF Electronic Data Capture and Workflow System for Clinical Trials Business challenge Most research takes place in different centers simultaneously. These are often located in different cities or even

More information

Digi Connectware Manager:

Digi Connectware Manager: Digi Connectware Manager: Dynamic IP Address Support White Paper Abstract In the world of TCP/IP, each network device receives an identifier called an IP address. Unfortunately, there are a finite number

More information

Data Replication in Privileged Credential Vaults

Data Replication in Privileged Credential Vaults Data Replication in Privileged Credential Vaults 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Background: Securing Privileged Accounts 2 2 The Business Challenge 3 3 Solution Approaches

More information

Snow Agent System Pilot Deployment version

Snow Agent System Pilot Deployment version Pilot Deployment version Security policy Revision: 1.0 Authors: Per Atle Bakkevoll, Johan Gustav Bellika, Lars, Taridzo Chomutare Page 1 of 8 Date of issue 03.07.2009 Revision history: Issue Details Who

More information

Exploring Oracle E-Business Suite Load Balancing Options. Venkat Perumal IT Convergence

Exploring Oracle E-Business Suite Load Balancing Options. Venkat Perumal IT Convergence Exploring Oracle E-Business Suite Load Balancing Options Venkat Perumal IT Convergence Objectives Overview of 11i load balancing techniques Load balancing architecture Scenarios to implement Load Balancing

More information

Equipment Room Database and Web-Based Inventory Management

Equipment Room Database and Web-Based Inventory Management Equipment Room Database and Web-Based Inventory Management Project Proposal Sean M. DonCarlos Ryan Learned Advisors: Dr. James H. Irwin Dr. Aleksander Malinowski December 12, 2002 TABLE OF CONTENTS Project

More information

Axapta Object Server MICROSOFT BUSINESS SOLUTIONS AXAPTA

Axapta Object Server MICROSOFT BUSINESS SOLUTIONS AXAPTA MICROSOFT BUSINESS SOLUTIONS AXAPTA Axapta Object Server Microsoft Business Solutions Axapta Object Server minimises bandwidth requirements and ensures easy, efficient and homogeneous client deployment.

More information

Base One's Rich Client Architecture

Base One's Rich Client Architecture Base One's Rich Client Architecture Base One provides a unique approach for developing Internet-enabled applications, combining both efficiency and ease of programming through its "Rich Client" architecture.

More information

BusinessObjects Enterprise XI Release 2 Administrator s Guide

BusinessObjects Enterprise XI Release 2 Administrator s Guide BusinessObjects Enterprise XI Release 2 Administrator s Guide BusinessObjects Enterprise XI Release 2 1 Patents Trademarks Copyright Third-party contributors Business Objects owns the following U.S. patents,

More information

A GENERIC ARCHITECTURE FOR WEB APPLICATIONS TO SUPPORT THREAT ANALYSIS OF INFRASTRUCTURAL COMPONENTS

A GENERIC ARCHITECTURE FOR WEB APPLICATIONS TO SUPPORT THREAT ANALYSIS OF INFRASTRUCTURAL COMPONENTS A GENERIC ARCHITECTURE FOR WEB APPLICATIONS TO SUPPORT THREAT ANALYSIS OF INFRASTRUCTURAL COMPONENTS Lieven Desmet, Bart Jacobs, Frank Piessens, and Wouter Joosen DistriNet Research Group, Katholieke Universiteit

More information

inforouter V8.0 Server & Client Requirements

inforouter V8.0 Server & Client Requirements inforouter V8.0 Server & Client Requirements Please review this document thoroughly before proceeding with the installation of inforouter Version 8. This document describes the minimum and recommended

More information

Web. Studio. Visual Studio. iseries. Studio. The universal development platform applied to corporate strategy. Adelia. www.hardis.

Web. Studio. Visual Studio. iseries. Studio. The universal development platform applied to corporate strategy. Adelia. www.hardis. Web Studio Visual Studio iseries Studio The universal development platform applied to corporate strategy Adelia www.hardis.com The choice of a CASE tool does not only depend on the quality of the offer

More information

Monitoring Traffic manager

Monitoring Traffic manager Monitoring Traffic manager eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced

More information

Dell and JBoss just work Inventory Management Clustering System on JBoss Enterprise Middleware

Dell and JBoss just work Inventory Management Clustering System on JBoss Enterprise Middleware Dell and JBoss just work Inventory Management Clustering System on JBoss Enterprise Middleware 2 Executive Summary 2 JBoss Enterprise Middleware 5 JBoss/Dell Inventory Management 5 Architecture 6 Benefits

More information

AuditMatic Enterprise Edition Installation Specifications

AuditMatic Enterprise Edition Installation Specifications Enterprise Edition Installation Specifications Version: 4.0 Copyright 2005 F.A.S., Inc. All rights reserved. Copyright 2008 F.A.S., Inc. All rights reserved. Copyright Notice Information contained in this

More information

2012 LABVANTAGE Solutions, Inc. All Rights Reserved.

2012 LABVANTAGE Solutions, Inc. All Rights Reserved. LABVANTAGE Architecture 2012 LABVANTAGE Solutions, Inc. All Rights Reserved. DOCUMENT PURPOSE AND SCOPE This document provides an overview of the LABVANTAGE hardware and software architecture. It is written

More information

Techniques for Scaling Components of Web Application

Techniques for Scaling Components of Web Application , March 12-14, 2014, Hong Kong Techniques for Scaling Components of Web Application Ademola Adenubi, Olanrewaju Lewis, Bolanle Abimbola Abstract Every organisation is exploring the enormous benefits of

More information

1 Product. Open Text is the leading fax server vendor in the world. *

1 Product. Open Text is the leading fax server vendor in the world. * 1 Product Open Text Fax s Replace fax machines and inefficient paper processes with efficient and secure computer-based faxing and electronic document delivery Open Text is the leading fax server vendor

More information

Certified E-commerce Consultant (CEC)

Certified E-commerce Consultant (CEC) Certified E-commerce Consultant (CEC) Syllabus Copyright This is intellectual property of ACTA S.A. and it is protected by Greek and European legislation concerning copyright. The creation of a copy of

More information

Data Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description

Data Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description Service Description Data Backup and Restore (DBR) Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable.

More information

Executive summary. Table of Contents. Benefits of an integration platform. Technical paper Infor Cloverleaf Integration Suite

Executive summary. Table of Contents. Benefits of an integration platform. Technical paper Infor Cloverleaf Integration Suite Technical paper Infor Cloverleaf Integration Suite Executive summary Many hospitals struggle with managing the increasing amounts of information coming from multiple data sources. Not only can it be difficult

More information

System requirements. Java SE Runtime Environment(JRE) 7 (32bit) Java SE Runtime Environment(JRE) 6 (64bit) Java SE Runtime Environment(JRE) 7 (64bit)

System requirements. Java SE Runtime Environment(JRE) 7 (32bit) Java SE Runtime Environment(JRE) 6 (64bit) Java SE Runtime Environment(JRE) 7 (64bit) Hitachi Solutions Geographical Information System Client Below conditions are system requirements for Hitachi Solutions Geographical Information System Client. 1/5 Hitachi Solutions Geographical Information

More information

Software design (Cont.)

Software design (Cont.) Package diagrams Architectural styles Software design (Cont.) Design modelling technique: Package Diagrams Package: A module containing any number of classes Packages can be nested arbitrarily E.g.: Java

More information

Designing a Microsoft SQL Server 2005 Infrastructure

Designing a Microsoft SQL Server 2005 Infrastructure Course Outline Other Information MS 2786 Days 2 Starting Time 9:00 Finish Time 4:30 Lunch & refreshments are included with this course. Designing a Microsoft SQL Server 2005 Infrastructure Introduction

More information

High Availability Implementation for JD Edwards EnterpriseOne

High Availability Implementation for JD Edwards EnterpriseOne High Availability Implementation for JD Edwards EnterpriseOne Ken Yeh, Manager, ERP Systems/JDE Enersource Colin Dawes, Director of Technology Services, Syntax Presentation Abstract Enersource Corporation

More information

Database FAQs - SQL Server

Database FAQs - SQL Server Database FAQs - SQL Server Kony Platform Release 5.0 Copyright 2013 by Kony, Inc. All rights reserved. August, 2013 This document contains information proprietary to Kony, Inc., is bound by the Kony license

More information

Chapter 1 - Web Server Management and Cluster Topology

Chapter 1 - Web Server Management and Cluster Topology Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management

More information

Full-scale Online Event Ticketing System The Design and Implementation

Full-scale Online Event Ticketing System The Design and Implementation ABSTRACT Full-scale Online Event Ticketing System The Design and Implementation The paper analyzed the system requirements for online shopping in general and specific requirements for event ticket online

More information

http://support.oracle.com/

http://support.oracle.com/ Oracle Primavera Contract Management 14.0 Sizing Guide October 2012 Legal Notices Oracle Primavera Oracle Primavera Contract Management 14.0 Sizing Guide Copyright 1997, 2012, Oracle and/or its affiliates.

More information

CA Identity Manager. Installation Guide (WebLogic) r12.5 SP8

CA Identity Manager. Installation Guide (WebLogic) r12.5 SP8 CA Identity Manager Installation Guide (WebLogic) r12.5 SP8 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Development of Open Source RESTful WHOIS. Haikuo Zhang

Development of Open Source RESTful WHOIS. Haikuo Zhang Development of Open Source RESTful WHOIS Haikuo Zhang Why We Need a New WHOIS Protocol WHOIS Protocol (RFC 3912) has problems WHOIS has never been internationalized WHOIS was defined for ASCII only WHOIS

More information

AA Automated Attendant is a device connected to voice mail systems that answers and may route incoming calls or inquiries.

AA Automated Attendant is a device connected to voice mail systems that answers and may route incoming calls or inquiries. CRM Glossary Guide AA Automated Attendant is a device connected to voice mail systems that answers and may route incoming calls or inquiries. ABANDON RATE Abandon Rate refers to the percentage of phone

More information

Tier Architectures. Kathleen Durant CS 3200

Tier Architectures. Kathleen Durant CS 3200 Tier Architectures Kathleen Durant CS 3200 1 Supporting Architectures for DBMS Over the years there have been many different hardware configurations to support database systems Some are outdated others

More information

Requirement Priority Name Requirement Text Response Comment

Requirement Priority Name Requirement Text Response Comment N-Tiered Architecture Accessibility Application architecture shall consist of a minimum of four tiers: proxy, presentation, application, and data [base]. Each of the fours tiers shall be separated with

More information

Contents Introduction... 5 Deployment Considerations... 9 Deployment Architectures... 11

Contents Introduction... 5 Deployment Considerations... 9 Deployment Architectures... 11 Oracle Primavera Contract Management 14.1 Sizing Guide July 2014 Contents Introduction... 5 Contract Management Database Server... 5 Requirements of the Contract Management Web and Application Servers...

More information

Transformation of POS Operations at

Transformation of POS Operations at Transformation of POS Operations at Retail Outlets for Australian Telco Abstract A leading Australian telecommunications service provider wanted to upgrade its Point of Sale (POS) operations at its retail

More information

Software. Quidview 56 CAMS 57. XLog NTAS 58

Software. Quidview 56 CAMS 57. XLog NTAS 58 Software Quidview 56 CAMS 57 XLog NTAS 58 55 Quidview Quidview Network Management System Quidview network management software is a suite of scalable tools for simplifying the network management and maintenance.

More information

PROGRESS DATADIRECT QA AND PERFORMANCE TESTING EXTENSIVE TESTING ENSURES DATA CONNECTIVITY THAT WORKS

PROGRESS DATADIRECT QA AND PERFORMANCE TESTING EXTENSIVE TESTING ENSURES DATA CONNECTIVITY THAT WORKS Progress DataDirect Connect DATA SHEET PROGRESS DATADIRECT QA AND PERFORMANCE TESTING EXTENSIVE TESTING ENSURES DATA CONNECTIVITY THAT WORKS Progress DataDirect ODBC, JDBC and ADO.NET data connectivity

More information

Top 7 Tips for Better Business Continuity

Top 7 Tips for Better Business Continuity Top 7 Tips for Better Business Continuity With Hosted Fax www.biscom.com sales@biscom.com (+1) 800-477-2472 or (+1) 978-250-1800 Introduction Biscom s Secure File Transfer (Biscom SFT) solution enables

More information

IT Architecture Review. ISACA Conference Fall 2003

IT Architecture Review. ISACA Conference Fall 2003 IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture

More information

Design of Electronic Medical Record System Based on Cloud Computing Technology

Design of Electronic Medical Record System Based on Cloud Computing Technology TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.5, May 2014, pp. 4010 ~ 4017 DOI: http://dx.doi.org/10.11591/telkomnika.v12i5.4392 4010 Design of Electronic Medical Record System Based

More information

System Requirements. Version 2015.0

System Requirements. Version 2015.0 System Requirements Version 2015.0 Copyright Copyright 2000-2015, NICE s.r.l. All right reserved. We'd Like to Hear from You You can help us make this document better by telling us what you think of the

More information

Implementing the Application Control Engine Service Module

Implementing the Application Control Engine Service Module Course: Implementing the Application Control Engine Service Module Duration: 4 Day Hands-On Lab & Lecture Course Price: $ 2,995.00 Learning Credits: 30 Hitachi HiPass: 4 Description: Implementing the Application

More information

ActiveXperts Network Monitor. White Paper

ActiveXperts Network Monitor. White Paper ActiveXperts Network Monitor Centralized monitoring of Windows, Novell, Linux and Unix servers White Paper 2008, ActiveXperts Software B.V. This document is written by ActiveXperts Software B.V. and represents

More information

Lync SHIELD Product Suite

Lync SHIELD Product Suite Lync SHIELD Product Suite The Natural Solution For Securing Lync Connectivity For today s mobile enterprise, the need to connect smartphones to the corporate network has become a vital business requirement.

More information

Data Sheet. NCP Secure Enterprise Management. General description. Highlights

Data Sheet. NCP Secure Enterprise Management. General description. Highlights Data Sheet NCP Secure Enterprise Management General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access technology with integrated RADIUS server

More information

KonyOne Server Prerequisites _ MS SQL Server

KonyOne Server Prerequisites _ MS SQL Server KonyOne Server Prerequisites _ MS SQL Server KonyOne Platform Release 5.0 Copyright 2012-2013 Kony Solutions, Inc. All Rights Reserved. Page 1 of 13 Copyright 2012-2013 by Kony Solutions, Inc. All rights

More information

NETWORK MONITORING & ALERTING SERVICES SERVICE DEFINITION

NETWORK MONITORING & ALERTING SERVICES SERVICE DEFINITION NETWORK MONITORING & ALERTING SERVICES Complete IT Support for Business Westgate IT Network Monitoring & Alerting Services: Service Definition Service Name Network Monitoring & Alerting Services Overview

More information

Alliance AES Encryption for IBM i Solution Brief

Alliance AES Encryption for IBM i Solution Brief Encryption & Tokenization Alliance AES Encryption for IBM i Solution Brief A Complete AES Encryption Solution Alliance AES Encryption for IBM i provides AES encryption for sensitive data everywhere it

More information

Table of Contents. Introduction. Audience. At Course Completion

Table of Contents. Introduction. Audience. At Course Completion Table of Contents Introduction Audience At Course Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course Outline Introduction This three-day instructor-led course provides

More information

Perfect (ASD) Point of Sales (POS)

Perfect (ASD) Point of Sales (POS) Perfect (ASD) Point of Sales (POS) ASD POS is a comprehensive Point of Sale (POS) solution for fast-paced, high-volume, multi-site retail operations. Whether you need to manage a single retail location,

More information

DJIGZO EMAIL ENCRYPTION. Djigzo white paper

DJIGZO EMAIL ENCRYPTION. Djigzo white paper DJIGZO EMAIL ENCRYPTION Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or

More information

NCP Secure Enterprise Management Next Generation Network Access Technology

NCP Secure Enterprise Management Next Generation Network Access Technology Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access

More information

Phire Architect Hardware and Software Requirements

Phire Architect Hardware and Software Requirements Phire Architect Hardware and Software Requirements Copyright 2014, Phire. All rights reserved. The Programs (which include both the software and documentation) contain proprietary information; they are

More information

Release: 1. ICADBS601A Build a data warehouse

Release: 1. ICADBS601A Build a data warehouse Release: 1 ICADBS601A Build a data warehouse ICADBS601A Build a data warehouse Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications Technology

More information

Eclectic Computing. Time Tracking Tool Software Architecture Document. Version <1.3>

Eclectic Computing. Time Tracking Tool Software Architecture Document. Version <1.3> Eclectic Computing Time Tracking Tool Version Revision History Date Version Description Author 7/Mar/05 1.0 Documentation of high-level architecture. David Janzen 7/Apr/05 1.1 Architecture at end

More information

How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm

How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm ULTEO OPEN VIRTUAL DESKTOP V4.0.2 ARCHITECTURE OVERVIEW Contents 1 Introduction 2 2 Servers Roles 3 2.1 Session Manager................................. 3 2.2 Application Server................................

More information

Credit Card Processing Overview

Credit Card Processing Overview CardControl 3.0 Credit Card Processing Overview Overview Credit card processing is a very complex and important system for anyone that sells goods. This guide will hopefully help educate and inform new

More information

Oracle Identity Analytics Architecture. An Oracle White Paper July 2010

Oracle Identity Analytics Architecture. An Oracle White Paper July 2010 Oracle Identity Analytics Architecture An Oracle White Paper July 2010 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may

More information

Web-based gambling and sports betting system 2011. Requirement specification

Web-based gambling and sports betting system 2011. Requirement specification Web-based gambling and sports betting system 2011. Requirement specification CONTENTS 1. Objective of the system... 3 2. Business and functional requirements... 3 2.1. Player registration and players'

More information

Network device management solution

Network device management solution iw Management Console Network device management solution iw MANAGEMENT CONSOLE Scalability. Reliability. Real-time communications. Productivity. Network efficiency. You demand it from your ERP systems

More information

Architecture and Mode of Operation

Architecture and Mode of Operation Open Source Scheduler Architecture and Mode of Operation http://jobscheduler.sourceforge.net Contents Components Platforms & Databases Architecture Configuration Deployment Distributed Processing Security

More information

Web and e-business Technologies

Web and e-business Technologies ActivePotato Corporation www.activepotato.com Web and e-business Technologies By Rohit Chugh rohit.chugh@activepotato.com For the IEEE Ottawa Chapter June 2, 2003 2003 by Rohit Chugh 1 Agenda Web Technologies

More information

eticketing Architecture Overview

eticketing Architecture Overview Group eticketing Architecture Overview The purpose of this document is to provide Ticket Office management with an introduction to eticketing service capabilities. With the uptake of ecommerce on the Internet,

More information

OVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available

OVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available Phone: (603)883-7979 sales@cepoint.com Cepoint Cluster Server CEP Cluster Server turnkey system. ENTERPRISE HIGH AVAILABILITY, High performance and very reliable Super Computing Solution for heterogeneous

More information

SysAidTM Product Description

SysAidTM Product Description SysAidTM Product Description September 2006 IT Challenges As the ratio of computers to IT staff grows, so does the visibility of the IT department in organizations. Efficiency and responsiveness has become

More information

Installation Guide. SAP Control Center 3.3

Installation Guide. SAP Control Center 3.3 Installation Guide SAP Control Center 3.3 DOCUMENT ID: DC01002-01-0330-01 LAST REVISED: November 2013 Copyright 2013 by SAP AG or an SAP affiliate company. All rights reserved. No part of this publication

More information

SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN

SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN 1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10

More information

Guardium Change Auditing System (CAS)

Guardium Change Auditing System (CAS) Guardium Change Auditing System (CAS) Highlights. Tracks all changes that can affect the security of database environments outside the scope of the database engine Complements Guardium's Database Activity

More information

SAP NetWeaver 7.0 - Application Server architecture

SAP NetWeaver 7.0 - Application Server architecture SAP NetWeaver 7.0 - Application Server architecture 1. Introduction The purpose of this document is to explain what components are part of the SAP NetWeaver Application Server and to explain in details

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

ACI Card and Merchant ManagementTM solutions overview

ACI Card and Merchant ManagementTM solutions overview PRODUCT LINE BROCHURE ACI Card and Merchant ManagementTM solutions overview Comprehensive credit, debit, smart card and prepaid card management End-to-end merchant account management and settlement Management

More information

<Insert Picture Here> Move to Oracle Database with Oracle SQL Developer Migrations

<Insert Picture Here> Move to Oracle Database with Oracle SQL Developer Migrations Move to Oracle Database with Oracle SQL Developer Migrations The following is intended to outline our general product direction. It is intended for information purposes only, and

More information